nougat-2 concourse setup
This commit is contained in:
parent
6235162876
commit
59ed4d91db
43
hosts/nougat-2/acme.nix
Normal file
43
hosts/nougat-2/acme.nix
Normal file
|
@ -0,0 +1,43 @@
|
|||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
self,
|
||||
...
|
||||
}: let
|
||||
exDomain = (import ./ex-domain.nix) lib;
|
||||
pubsolarDomain = import ./pubsolar-domain.nix;
|
||||
|
||||
hostingdeProviderConf = {
|
||||
dnsProvider = "hostingde";
|
||||
credentialsFile = "${pkgs.writeText "hostingde-creds" ''
|
||||
HOSTINGDE_API_KEY_FILE=${config.age.secrets."hosting.de-api.key".path}
|
||||
''}";
|
||||
};
|
||||
in {
|
||||
age.secrets."hosting.de-api.key" = {
|
||||
file = "${self}/secrets/hosting.de-api.key";
|
||||
mode = "440";
|
||||
owner = "acme";
|
||||
};
|
||||
|
||||
security.acme = {
|
||||
acceptTerms = true;
|
||||
defaults.email = "acme@benjaminbaedorf.eu";
|
||||
|
||||
certs."b12f.io" = hostingdeProviderConf;
|
||||
certs."mail.b12f.io" = hostingdeProviderConf;
|
||||
certs."transmission.b12f.io" = hostingdeProviderConf;
|
||||
|
||||
certs."${exDomain}" = hostingdeProviderConf;
|
||||
certs."mail.${exDomain}" = hostingdeProviderConf;
|
||||
|
||||
certs."${pubsolarDomain}" = hostingdeProviderConf;
|
||||
certs."www.${pubsolarDomain}" = hostingdeProviderConf;
|
||||
certs."auth.${pubsolarDomain}" = hostingdeProviderConf;
|
||||
certs."git.${pubsolarDomain}" = hostingdeProviderConf;
|
||||
certs."ci.${pubsolarDomain}" = hostingdeProviderConf;
|
||||
certs."list.${pubsolarDomain}" = hostingdeProviderConf;
|
||||
certs."obs-portal.${pubsolarDomain}" = hostingdeProviderConf;
|
||||
};
|
||||
}
|
141
hosts/nougat-2/caddy.nix
Normal file
141
hosts/nougat-2/caddy.nix
Normal file
|
@ -0,0 +1,141 @@
|
|||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
self,
|
||||
...
|
||||
}: let
|
||||
pubsolarDomain = import ./pubsolar-domain.nix;
|
||||
in {
|
||||
networking.networkmanager.unmanaged = ["interface-name:ve-caddy"];
|
||||
networking.nat = {
|
||||
enable = true;
|
||||
|
||||
internalInterfaces = ["ve-caddy"];
|
||||
externalInterface = "enp0s31f6";
|
||||
|
||||
# Lazy IPv6 connectivity for the container
|
||||
enableIPv6 = true;
|
||||
};
|
||||
containers.caddy = {
|
||||
autoStart = true;
|
||||
privateNetwork = true;
|
||||
hostAddress = "192.168.101.0";
|
||||
localAddress = "192.168.102.0";
|
||||
hostAddress6 = "fc00::1";
|
||||
localAddress6 = "fc00::2";
|
||||
|
||||
forwardPorts = [
|
||||
{
|
||||
containerPort = 443;
|
||||
hostPort = 443;
|
||||
protocol = "tcp";
|
||||
}
|
||||
{
|
||||
containerPort = 80;
|
||||
hostPort = 80;
|
||||
protocol = "tcp";
|
||||
}
|
||||
];
|
||||
|
||||
bindMounts = {
|
||||
"/srv/www/" = {
|
||||
hostPath = "/data/www/";
|
||||
isReadOnly = false;
|
||||
};
|
||||
};
|
||||
|
||||
config = {
|
||||
services.caddy = {
|
||||
enable = lib.mkForce true;
|
||||
group = "hakkonaut";
|
||||
email = "admins@pub.solar";
|
||||
globalConfig = lib.mkForce ''
|
||||
auto_https off
|
||||
'';
|
||||
acmeCA = null;
|
||||
virtualHosts = {
|
||||
"dashboard.nougat-2.b12f.io" = {
|
||||
extraConfig = ''
|
||||
reverse_proxy :2019
|
||||
'';
|
||||
};
|
||||
"www.b12f.io" = {
|
||||
extraConfig = ''
|
||||
redir https://pub.solar{uri}
|
||||
'';
|
||||
};
|
||||
"mail.b12f.io" = {
|
||||
extraConfig = ''
|
||||
redir / /realms/pub.solar/account temporary
|
||||
reverse_proxy :8080
|
||||
'';
|
||||
};
|
||||
|
||||
"${pubsolarDomain}" = {
|
||||
logFormat = lib.mkForce ''
|
||||
output discard
|
||||
'';
|
||||
extraConfig = ''
|
||||
# PubSolarOS images
|
||||
handle /os/download/* {
|
||||
root * /srv/www
|
||||
file_server /os/download/* browse
|
||||
}
|
||||
# serve base domain pub.solar for mastodon.pub.solar
|
||||
# https://masto.host/mastodon-usernames-different-from-the-domain-used-for-installation/
|
||||
handle /.well-known/host-meta {
|
||||
redir https://mastodon.${pubsolarDomain}{uri}
|
||||
}
|
||||
# pub.solar website
|
||||
handle {
|
||||
root * /srv/www/pub.solar
|
||||
try_files {path}.html {path}
|
||||
file_server
|
||||
}
|
||||
# minimal error handling, respond with status code and text
|
||||
handle_errors {
|
||||
respond "{http.error.status_code} {http.error.status_text}"
|
||||
}
|
||||
'';
|
||||
};
|
||||
"www.${pubsolarDomain}" = {
|
||||
logFormat = lib.mkForce ''
|
||||
output discard
|
||||
'';
|
||||
extraConfig = ''
|
||||
redir https://${pubsolarDomain}{uri}
|
||||
'';
|
||||
};
|
||||
"auth.${pubsolarDomain}" = {
|
||||
logFormat = lib.mkForce ''
|
||||
output discard
|
||||
'';
|
||||
extraConfig = ''
|
||||
redir / /realms/${pubsolarDomain}/account temporary
|
||||
reverse_proxy 192.168.103.0:8080
|
||||
'';
|
||||
};
|
||||
"git.${pubsolarDomain}" = {
|
||||
logFormat = lib.mkForce ''
|
||||
output discard
|
||||
'';
|
||||
extraConfig = ''
|
||||
redir /user/login /user/oauth2/keycloak temporary
|
||||
reverse_proxy 192.168.101.0:3000
|
||||
'';
|
||||
};
|
||||
"ci.${pubsolarDomain}" = {
|
||||
logFormat = lib.mkForce ''
|
||||
output discard
|
||||
'';
|
||||
extraConfig = ''
|
||||
reverse_proxy 192.168.101.0:8080
|
||||
'';
|
||||
};
|
||||
};
|
||||
};
|
||||
networking.firewall.allowedTCPPorts = [80 443];
|
||||
};
|
||||
};
|
||||
}
|
105
hosts/nougat-2/concourse.nix
Normal file
105
hosts/nougat-2/concourse.nix
Normal file
|
@ -0,0 +1,105 @@
|
|||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
self,
|
||||
...
|
||||
}: let
|
||||
pubsolarDomain = import ./pubsolar-domain.nix;
|
||||
|
||||
getSecret = name:
|
||||
lib.attrsets.setAttrByPath [name] {
|
||||
file = "${self}/secrets/${name}.age";
|
||||
mode = "600";
|
||||
owner = "concourse";
|
||||
};
|
||||
|
||||
keys = [
|
||||
"concourse-session-signing-key"
|
||||
"concourse-worker-key"
|
||||
"concourse-tsa-host-key"
|
||||
];
|
||||
|
||||
secrets =
|
||||
[
|
||||
"concourse-secrets"
|
||||
"concourse-db-secrets"
|
||||
]
|
||||
++ keys;
|
||||
in {
|
||||
age.secrets = lib.lists.foldl (a: b: a // getSecret b) {} secrets;
|
||||
|
||||
users.users.concourse = {
|
||||
description = "Concourse Service";
|
||||
home = "/var/lib/concourse";
|
||||
useDefaultShell = true;
|
||||
uid = 10001;
|
||||
group = "concourse";
|
||||
isSystemUser = true;
|
||||
};
|
||||
|
||||
users.groups.concourse = {};
|
||||
|
||||
systemd.tmpfiles.rules = [
|
||||
"d '/var/lib/concourse' 0750 concourse concourse - -"
|
||||
];
|
||||
|
||||
virtualisation.oci-containers = {
|
||||
containers."concourse-db" = {
|
||||
image = "postgres:14";
|
||||
autoStart = true;
|
||||
user = "994";
|
||||
volumes = [
|
||||
"/data/concourse/db:/var/lib/postgresql/data"
|
||||
];
|
||||
extraOptions = [
|
||||
"--network=concourse-net"
|
||||
];
|
||||
environmentFiles = [
|
||||
config.age.secrets.concourse-db-secrets.path
|
||||
];
|
||||
};
|
||||
|
||||
containers."concourse" = {
|
||||
image = "concourse/concourse:7.9.1";
|
||||
autoStart = true;
|
||||
user = "10001";
|
||||
ports = [
|
||||
"8080:8080"
|
||||
];
|
||||
dependsOn = ["concourse-db"];
|
||||
extraOptions = [
|
||||
"--network=concourse-net"
|
||||
];
|
||||
volumes = [
|
||||
"${config.age.secrets.concourse-session-signing-key.path}:/keys/session_signing_key"
|
||||
"${config.age.secrets.concourse-worker-key.path}:/keys/worker_key"
|
||||
"${config.age.secrets.concourse-tsa-host-key.path}:/keys/tsa_host_key"
|
||||
];
|
||||
|
||||
environment = {
|
||||
CONCOURSE_EXTERNAL_URL = "https://ci.${pubsolarDomain}";
|
||||
|
||||
CONCOURSE_ADD_LOCAL_USER = "crew:changeme";
|
||||
CONCOURSE_MAIN_TEAM_LOCAL_USER = "crew";
|
||||
|
||||
# instead of relying on the default "detect"
|
||||
CONCOURSE_WORKER_BAGGAGECLAIM_DRIVER = "overlay";
|
||||
CONCOURSE_X_FRAME_OPTIONS = "allow";
|
||||
CONCOURSE_CONTENT_SECURITY_POLICY = "*";
|
||||
CONCOURSE_CLUSTER_NAME = "pub.solar";
|
||||
CONCOURSE_WORKER_CONTAINERD_DNS_SERVER = "8.8.8.8";
|
||||
|
||||
CONCOURSE_SESSION_SIGNING_KEY = "/keys/session_signing_key";
|
||||
CONCOURSE_TSA_HOST_KEY = "/keys/tsa_host_key";
|
||||
CONCOURSE_TSA_AUTHORIZED_KEYS = "/keys/worker_key";
|
||||
|
||||
# For ARM-based machine, change the Concourse runtime to "houdini"
|
||||
CONCOURSE_WORKER_RUNTIME = "containerd";
|
||||
};
|
||||
environmentFiles = [
|
||||
config.age.secrets.concourse-secrets.path
|
||||
];
|
||||
};
|
||||
};
|
||||
}
|
|
@ -88,6 +88,34 @@ in {
|
|||
services.openssh.enable = true;
|
||||
services.openssh.settings.PermitRootLogin = "prohibit-password";
|
||||
|
||||
pub-solar.core.disk-encryption-active = false;
|
||||
pub-solar.core.lite = true;
|
||||
|
||||
virtualisation = {
|
||||
docker = {
|
||||
enable = true;
|
||||
extraOptions = ''
|
||||
--data-root /data/docker
|
||||
'';
|
||||
};
|
||||
|
||||
oci-containers = {
|
||||
backend = "docker";
|
||||
};
|
||||
};
|
||||
|
||||
security.sudo.extraRules = [
|
||||
{
|
||||
users = ["${psCfg.user.name}"];
|
||||
commands = [
|
||||
{
|
||||
command = "ALL";
|
||||
options = ["NOPASSWD"];
|
||||
}
|
||||
];
|
||||
}
|
||||
];
|
||||
|
||||
# This value determines the NixOS release with which your system is to be
|
||||
# compatible, in order to avoid breaking some software such as database
|
||||
# servers. You should change this only after NixOS release notes say you
|
||||
|
|
39
hosts/nougat-2/email.nix
Normal file
39
hosts/nougat-2/email.nix
Normal file
|
@ -0,0 +1,39 @@
|
|||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}: let
|
||||
exDomain = (import ./ex-domain.nix) lib;
|
||||
in {
|
||||
imports = [
|
||||
(builtins.fetchTarball {
|
||||
# Pick a commit from the branch you are interested in
|
||||
url = "https://gitlab.com/simple-nixos-mailserver/nixos-mailserver/-/archive/0c1801b48995ec6909e040abedaa56a64f0db430/nixos-mailserver-0c1801b48995ec6909e040abedaa56a64f0db430.tar.gz";
|
||||
# And set its hash
|
||||
sha256 = "";
|
||||
})
|
||||
];
|
||||
|
||||
mailserver = {
|
||||
enable = true;
|
||||
fqdn = "mail.b12f.io";
|
||||
domains = ["b12f.io" exDomain];
|
||||
|
||||
# A list of all login accounts. To create the password hashes, use
|
||||
# nix-shell -p mkpasswd --run 'mkpasswd -sm bcrypt'
|
||||
loginAccounts."mail@b12f.io" = {
|
||||
hashedPassword = "$2b$05$Ak1YLaRtdBI6h0uwSIzpKuF3v9JIxRBwODrARTLSlPM8guYI1rNmC";
|
||||
aliases = ["@example.com"];
|
||||
};
|
||||
|
||||
loginAccounts."mail@${exDomain}" = {
|
||||
hashedPassword = "$2b$05$wWs55JDK1.LiPqKPF3egfu/3ocEQGihD7hkvLqvVsAzmKSzL0DGdi";
|
||||
aliases = [("@" + exDomain)];
|
||||
};
|
||||
|
||||
# Use Let's Encrypt certificates. Note that this needs to set up a stripped
|
||||
# down nginx and opens port 80.
|
||||
certificateScheme = "acme";
|
||||
};
|
||||
}
|
1
hosts/nougat-2/ex-domain.nix
Normal file
1
hosts/nougat-2/ex-domain.nix
Normal file
|
@ -0,0 +1 @@
|
|||
lib: lib.concatStrings (lib.lists.reverseList ["et" ".n" "zz" "wd" "h"])
|
84
hosts/nougat-2/gitea.nix
Normal file
84
hosts/nougat-2/gitea.nix
Normal file
|
@ -0,0 +1,84 @@
|
|||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
self,
|
||||
...
|
||||
}: let
|
||||
pubsolarDomain = import ./pubsolar-domain.nix;
|
||||
in {
|
||||
age.secrets.gitea-database-password = {
|
||||
file = "${self}/secrets/gitea-database-password.age";
|
||||
mode = "600";
|
||||
owner = "gitea";
|
||||
};
|
||||
|
||||
# age.secrets.gitea-mailer-password = {
|
||||
# file = "${self}/secrets/gitea-mailer-password.age";
|
||||
# mode = "600";
|
||||
# owner = "gitea";
|
||||
# };
|
||||
|
||||
services.gitea = {
|
||||
enable = true;
|
||||
package = pkgs.forgejo;
|
||||
appName = "pub.solar git server";
|
||||
database = {
|
||||
type = "postgres";
|
||||
passwordFile = config.age.secrets.gitea-database-password.path;
|
||||
};
|
||||
lfs.enable = true;
|
||||
# mailerPasswordFile = config.age.secrets.gitea-mailer-password.path;
|
||||
settings = {
|
||||
server = {
|
||||
DOMAIN = "git.${pubsolarDomain}";
|
||||
HTTP_ADDR = "127.0.0.1";
|
||||
HTTP_PORT = 3000;
|
||||
ROOT_URL = "https://git.${pubsolarDomain}";
|
||||
};
|
||||
mailer = {
|
||||
ENABLED = false;
|
||||
PROTOCOL = "smtps";
|
||||
SMTP_ADDR = "mx2.greenbaum.cloud";
|
||||
SMTP_PORT = 465;
|
||||
FROM = ''"pub.solar git server" <gitea@pub.solar>'';
|
||||
USER = "admins@pub.solar";
|
||||
};
|
||||
"repository.signing" = {
|
||||
SIGNING_KEY = "default";
|
||||
MERGES = "always";
|
||||
};
|
||||
openid = {
|
||||
ENABLE_OPENID_SIGNIN = true;
|
||||
ENABLE_OPENID_SIGNUP = true;
|
||||
};
|
||||
# uncomment after initial deployment, first user is admin user
|
||||
# required to setup SSO (oauth openid-connect, keycloak auth provider)
|
||||
service.ALLOW_ONLY_EXTERNAL_REGISTRATION = true;
|
||||
service.ENABLE_NOTIFY_MAIL = true;
|
||||
session.COOKIE_SECURE = lib.mkForce true;
|
||||
};
|
||||
};
|
||||
|
||||
# See: https://docs.gitea.io/en-us/signing/#installing-and-generating-a-gpg-key-for-gitea
|
||||
# Required for gitea server side gpg signatures
|
||||
# configured/setup manually in:
|
||||
# /var/lib/gitea/data/home/.gitconfig
|
||||
# /var/lib/gitea/data/home/.gnupg/
|
||||
# sudo su gitea
|
||||
# export GNUPGHOME=/var/lib/gitea/data/home/.gnupg
|
||||
# gpg --quick-gen-key 'pub.solar gitea <gitea@pub.solar>' ed25519
|
||||
# TODO: implement declarative GPG key generation and
|
||||
# gitea gitconfig
|
||||
programs.gnupg.agent = {
|
||||
enable = true;
|
||||
pinentryFlavor = "curses";
|
||||
};
|
||||
# Required to make gpg work without a graphical environment?
|
||||
# otherwise generating a new gpg key fails with this error:
|
||||
# gpg: agent_genkey failed: No pinentry
|
||||
# see: https://github.com/NixOS/nixpkgs/issues/97861#issuecomment-827951675
|
||||
environment.variables = {
|
||||
GPG_TTY = "$(tty)";
|
||||
};
|
||||
}
|
|
@ -42,6 +42,11 @@
|
|||
fsType = "vfat";
|
||||
};
|
||||
|
||||
fileSystems."/data" = {
|
||||
device = "/dev/disk/by-uuid/824341f0-fd56-4db7-bb7e-4f161d94144b";
|
||||
fsType = "ext4";
|
||||
};
|
||||
|
||||
swapDevices = [
|
||||
{device = "/dev/disk/by-uuid/f37e9f96-0174-4cac-a0bb-b63b2a67a4ad";}
|
||||
];
|
||||
|
|
48
hosts/nougat-2/keycloak.nix
Normal file
48
hosts/nougat-2/keycloak.nix
Normal file
|
@ -0,0 +1,48 @@
|
|||
{
|
||||
config,
|
||||
lib,
|
||||
inputs,
|
||||
pkgs,
|
||||
self,
|
||||
...
|
||||
}: let
|
||||
pubsolarDomain = import ./pubsolar-domain.nix;
|
||||
in {
|
||||
age.secrets.keycloak-database-password = {
|
||||
file = "${self}/secrets/keycloak-database-password.age";
|
||||
mode = "700";
|
||||
#owner = "keycloak";
|
||||
};
|
||||
|
||||
containers.keycloak = {
|
||||
autoStart = true;
|
||||
privateNetwork = true;
|
||||
hostAddress = "192.168.101.0";
|
||||
localAddress = "192.168.103.0";
|
||||
hostAddress6 = "fc00::1";
|
||||
localAddress6 = "fc00::3";
|
||||
|
||||
bindMounts = {
|
||||
"/var/lib/postgresql/14" = {
|
||||
hostPath = "/data/keycloak/db";
|
||||
isReadOnly = false;
|
||||
};
|
||||
};
|
||||
|
||||
config = {
|
||||
services.keycloak = {
|
||||
enable = true;
|
||||
database.passwordFile = config.age.secrets.keycloak-database-password.path;
|
||||
settings = {
|
||||
hostname = "auth.${pubsolarDomain}";
|
||||
http-host = "0.0.0.0";
|
||||
http-port = 8080;
|
||||
proxy = "edge";
|
||||
};
|
||||
themes = {
|
||||
"pub.solar" = inputs.keycloak-theme-pub-solar.legacyPackages.${pkgs.system}.keycloak-theme-pub-solar;
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
143
hosts/nougat-2/mailman.nix
Normal file
143
hosts/nougat-2/mailman.nix
Normal file
|
@ -0,0 +1,143 @@
|
|||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
self,
|
||||
...
|
||||
}: let
|
||||
postfixConfig = pkgs.writeTextFile {
|
||||
name = "main.cf";
|
||||
text = builtins.readFile ./postfix/main.cf;
|
||||
};
|
||||
in {
|
||||
system.activationScripts.mkMailmanNet = let
|
||||
docker = config.virtualisation.oci-containers.backend;
|
||||
dockerBin = "${pkgs.${docker}}/bin/${docker}";
|
||||
in ''
|
||||
${dockerBin} network inspect mailman-net >/dev/null 2>&1 || ${dockerBin} network create mailman-net --subnet 172.20.1.0/24
|
||||
'';
|
||||
|
||||
users.users.mailman = {
|
||||
description = "Mailman Service";
|
||||
home = "/var/lib/mailman";
|
||||
useDefaultShell = true;
|
||||
uid = 993;
|
||||
# Group hakkonaut so caddy can serve the static files from mailman-web directly
|
||||
group = "hakkonaut";
|
||||
isSystemUser = true;
|
||||
};
|
||||
|
||||
systemd.tmpfiles.rules = [
|
||||
"d '/var/lib/mailman' 0750 mailman hakkonaut - -"
|
||||
];
|
||||
|
||||
age.secrets.mailman-core-secrets = {
|
||||
file = "${self}/secrets/mailman-core-secrets.age";
|
||||
mode = "600";
|
||||
owner = "mailman";
|
||||
};
|
||||
|
||||
age.secrets.mailman-web-secrets = {
|
||||
file = "${self}/secrets/mailman-web-secrets.age";
|
||||
mode = "600";
|
||||
owner = "mailman";
|
||||
};
|
||||
|
||||
age.secrets.mailman-db-secrets = {
|
||||
file = "${self}/secrets/mailman-db-secrets.age";
|
||||
mode = "600";
|
||||
owner = "mailman";
|
||||
};
|
||||
|
||||
virtualisation = {
|
||||
docker = {
|
||||
enable = true;
|
||||
};
|
||||
|
||||
oci-containers = {
|
||||
backend = "docker";
|
||||
containers."mailman-core" = {
|
||||
image = "maxking/mailman-core:0.4";
|
||||
autoStart = true;
|
||||
user = "993";
|
||||
volumes = [
|
||||
"/var/lib/mailman/core:/opt/mailman/"
|
||||
];
|
||||
extraOptions = [
|
||||
"--network=mailman-net"
|
||||
];
|
||||
environment = {
|
||||
DATABASE_TYPE = "postgres";
|
||||
DATABASE_CLASS = "mailman.database.postgresql.PostgreSQLDatabase";
|
||||
MTA = "postfix";
|
||||
};
|
||||
environmentFiles = [
|
||||
config.age.secrets.mailman-core-secrets.path
|
||||
];
|
||||
ports = [
|
||||
"127.0.0.1:8001:8001" # API
|
||||
"127.0.0.1:8024:8024" # LMTP - incoming emails
|
||||
];
|
||||
};
|
||||
|
||||
containers."mailman-web" = {
|
||||
image = "maxking/mailman-web:0.4";
|
||||
autoStart = true;
|
||||
user = "993";
|
||||
volumes = [
|
||||
"/var/lib/mailman/web:/opt/mailman-web-data"
|
||||
];
|
||||
extraOptions = [
|
||||
"--network=mailman-net"
|
||||
];
|
||||
environment = {
|
||||
DATABASE_TYPE = "postgres";
|
||||
SERVE_FROM_DOMAIN = "list.pub.solar";
|
||||
MAILMAN_ADMIN_USER = "admin";
|
||||
MAILMAN_ADMIN_EMAIL = "admins@pub.solar";
|
||||
};
|
||||
environmentFiles = [
|
||||
config.age.secrets.mailman-web-secrets.path
|
||||
];
|
||||
ports = [
|
||||
"127.0.0.1:8000:8000" # HTTP
|
||||
# "127.0.0.1:8080:8080" # uwsgi
|
||||
];
|
||||
};
|
||||
|
||||
containers."mailman-db" = {
|
||||
image = "postgres:14-alpine";
|
||||
autoStart = true;
|
||||
user = "993";
|
||||
extraOptions = [
|
||||
"--network=mailman-net"
|
||||
];
|
||||
volumes = [
|
||||
"/var/lib/mailman/database:/var/lib/postgresql/data"
|
||||
];
|
||||
environmentFiles = [
|
||||
config.age.secrets.mailman-db-secrets.path
|
||||
];
|
||||
};
|
||||
|
||||
containers."mailman-postfix" = {
|
||||
image = "mailu/postfix:1.9.46";
|
||||
autoStart = true;
|
||||
user = "993";
|
||||
extraOptions = [
|
||||
"--network=mailman-net"
|
||||
];
|
||||
volumes = [
|
||||
"/var/lib/mailman/postfix/overrides:/overrides:ro"
|
||||
"/var/lib/mailman/postfix/mailqueue:/var/spool/postfix"
|
||||
"/var/lib/mailman/postfix/data:/var/lib/postfix"
|
||||
"/var/lib/mailman/core:/var/lib/mailman/core"
|
||||
"${postfixConfig}:/etc/postfix/main.cf"
|
||||
];
|
||||
environmentFiles = [
|
||||
config.age.secrets.mailman-db-secrets.path
|
||||
];
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
|
@ -11,24 +11,11 @@ with lib; let
|
|||
in {
|
||||
imports = [
|
||||
./configuration.nix
|
||||
];
|
||||
|
||||
config = {
|
||||
hardware.cpu.intel.updateMicrocode = true;
|
||||
|
||||
pub-solar.core.disk-encryption-active = false;
|
||||
pub-solar.core.lite = true;
|
||||
|
||||
security.sudo.extraRules = [
|
||||
{
|
||||
users = ["${psCfg.user.name}"];
|
||||
commands = [
|
||||
{
|
||||
command = "ALL";
|
||||
options = ["NOPASSWD"];
|
||||
}
|
||||
./acme.nix
|
||||
./caddy.nix
|
||||
./keycloak.nix
|
||||
./gitea.nix
|
||||
./concourse.nix
|
||||
];
|
||||
}
|
||||
];
|
||||
};
|
||||
}
|
||||
|
|
692
hosts/nougat-2/postfix/main.cf
Normal file
692
hosts/nougat-2/postfix/main.cf
Normal file
|
@ -0,0 +1,692 @@
|
|||
# Global Postfix configuration file. This file lists only a subset
|
||||
# of all parameters. For the syntax, and for a complete parameter
|
||||
# list, see the postconf(5) manual page (command: "man 5 postconf").
|
||||
#
|
||||
# For common configuration examples, see BASIC_CONFIGURATION_README
|
||||
# and STANDARD_CONFIGURATION_README. To find these documents, use
|
||||
# the command "postconf html_directory readme_directory", or go to
|
||||
# http://www.postfix.org/BASIC_CONFIGURATION_README.html etc.
|
||||
#
|
||||
# For best results, change no more than 2-3 parameters at a time,
|
||||
# and test if Postfix still works after every change.
|
||||
|
||||
# COMPATIBILITY
|
||||
#
|
||||
# The compatibility_level determines what default settings Postfix
|
||||
# will use for main.cf and master.cf settings. These defaults will
|
||||
# change over time.
|
||||
#
|
||||
# To avoid breaking things, Postfix will use backwards-compatible
|
||||
# default settings and log where it uses those old backwards-compatible
|
||||
# default settings, until the system administrator has determined
|
||||
# if any backwards-compatible default settings need to be made
|
||||
# permanent in main.cf or master.cf.
|
||||
#
|
||||
# When this review is complete, update the compatibility_level setting
|
||||
# below as recommended in the RELEASE_NOTES file.
|
||||
#
|
||||
# The level below is what should be used with new (not upgrade) installs.
|
||||
#
|
||||
compatibility_level = 3.6
|
||||
|
||||
# SOFT BOUNCE
|
||||
#
|
||||
# The soft_bounce parameter provides a limited safety net for
|
||||
# testing. When soft_bounce is enabled, mail will remain queued that
|
||||
# would otherwise bounce. This parameter disables locally-generated
|
||||
# bounces, and prevents the SMTP server from rejecting mail permanently
|
||||
# (by changing 5xx replies into 4xx replies). However, soft_bounce
|
||||
# is no cure for address rewriting mistakes or mail routing mistakes.
|
||||
#
|
||||
#soft_bounce = no
|
||||
|
||||
# LOCAL PATHNAME INFORMATION
|
||||
#
|
||||
# The queue_directory specifies the location of the Postfix queue.
|
||||
# This is also the root directory of Postfix daemons that run chrooted.
|
||||
# See the files in examples/chroot-setup for setting up Postfix chroot
|
||||
# environments on different UNIX systems.
|
||||
#
|
||||
queue_directory = /var/spool/postfix
|
||||
|
||||
# The command_directory parameter specifies the location of all
|
||||
# postXXX commands.
|
||||
#
|
||||
command_directory = /usr/sbin
|
||||
|
||||
# The daemon_directory parameter specifies the location of all Postfix
|
||||
# daemon programs (i.e. programs listed in the master.cf file). This
|
||||
# directory must be owned by root.
|
||||
#
|
||||
daemon_directory = /usr/libexec/postfix
|
||||
|
||||
# The data_directory parameter specifies the location of Postfix-writable
|
||||
# data files (caches, random numbers). This directory must be owned
|
||||
# by the mail_owner account (see below).
|
||||
#
|
||||
data_directory = /var/lib/postfix
|
||||
|
||||
# QUEUE AND PROCESS OWNERSHIP
|
||||
#
|
||||
# The mail_owner parameter specifies the owner of the Postfix queue
|
||||
# and of most Postfix daemon processes. Specify the name of a user
|
||||
# account THAT DOES NOT SHARE ITS USER OR GROUP ID WITH OTHER ACCOUNTS
|
||||
# AND THAT OWNS NO OTHER FILES OR PROCESSES ON THE SYSTEM. In
|
||||
# particular, don't specify nobody or daemon. PLEASE USE A DEDICATED
|
||||
# USER.
|
||||
#
|
||||
mail_owner = postfix
|
||||
|
||||
# The default_privs parameter specifies the default rights used by
|
||||
# the local delivery agent for delivery to external file or command.
|
||||
# These rights are used in the absence of a recipient user context.
|
||||
# DO NOT SPECIFY A PRIVILEGED USER OR THE POSTFIX OWNER.
|
||||
#
|
||||
#default_privs = nobody
|
||||
|
||||
# INTERNET HOST AND DOMAIN NAMES
|
||||
#
|
||||
# The myhostname parameter specifies the internet hostname of this
|
||||
# mail system. The default is to use the fully-qualified domain name
|
||||
# from gethostname(). $myhostname is used as a default value for many
|
||||
# other configuration parameters.
|
||||
#
|
||||
myhostname = list.pub.solar
|
||||
#myhostname = virtual.domain.tld
|
||||
|
||||
# The mydomain parameter specifies the local internet domain name.
|
||||
# The default is to use $myhostname minus the first component.
|
||||
# $mydomain is used as a default value for many other configuration
|
||||
# parameters.
|
||||
#
|
||||
#mydomain = domain.tld
|
||||
|
||||
# SENDING MAIL
|
||||
#
|
||||
# The myorigin parameter specifies the domain that locally-posted
|
||||
# mail appears to come from. The default is to append $myhostname,
|
||||
# which is fine for small sites. If you run a domain with multiple
|
||||
# machines, you should (1) change this to $mydomain and (2) set up
|
||||
# a domain-wide alias database that aliases each user to
|
||||
# user@that.users.mailhost.
|
||||
#
|
||||
# For the sake of consistency between sender and recipient addresses,
|
||||
# myorigin also specifies the default domain name that is appended
|
||||
# to recipient addresses that have no @domain part.
|
||||
#
|
||||
#myorigin = $myhostname
|
||||
#myorigin = $mydomain
|
||||
|
||||
# RECEIVING MAIL
|
||||
|
||||
# The inet_interfaces parameter specifies the network interface
|
||||
# addresses that this mail system receives mail on. By default,
|
||||
# the software claims all active interfaces on the machine. The
|
||||
# parameter also controls delivery of mail to user@[ip.address].
|
||||
#
|
||||
# See also the proxy_interfaces parameter, for network addresses that
|
||||
# are forwarded to us via a proxy or network address translator.
|
||||
#
|
||||
# Note: you need to stop/start Postfix when this parameter changes.
|
||||
#
|
||||
#inet_interfaces = all
|
||||
#inet_interfaces = $myhostname
|
||||
#inet_interfaces = $myhostname, localhost
|
||||
|
||||
# The proxy_interfaces parameter specifies the network interface
|
||||
# addresses that this mail system receives mail on by way of a
|
||||
# proxy or network address translation unit. This setting extends
|
||||
# the address list specified with the inet_interfaces parameter.
|
||||
#
|
||||
# You must specify your proxy/NAT addresses when your system is a
|
||||
# backup MX host for other domains, otherwise mail delivery loops
|
||||
# will happen when the primary MX host is down.
|
||||
#
|
||||
#proxy_interfaces =
|
||||
#proxy_interfaces = 1.2.3.4
|
||||
|
||||
# The mydestination parameter specifies the list of domains that this
|
||||
# machine considers itself the final destination for.
|
||||
#
|
||||
# These domains are routed to the delivery agent specified with the
|
||||
# local_transport parameter setting. By default, that is the UNIX
|
||||
# compatible delivery agent that lookups all recipients in /etc/passwd
|
||||
# and /etc/aliases or their equivalent.
|
||||
#
|
||||
# The default is $myhostname + localhost.$mydomain + localhost. On
|
||||
# a mail domain gateway, you should also include $mydomain.
|
||||
#
|
||||
# Do not specify the names of virtual domains - those domains are
|
||||
# specified elsewhere (see VIRTUAL_README).
|
||||
#
|
||||
# Do not specify the names of domains that this machine is backup MX
|
||||
# host for. Specify those names via the relay_domains settings for
|
||||
# the SMTP server, or use permit_mx_backup if you are lazy (see
|
||||
# STANDARD_CONFIGURATION_README).
|
||||
#
|
||||
# The local machine is always the final destination for mail addressed
|
||||
# to user@[the.net.work.address] of an interface that the mail system
|
||||
# receives mail on (see the inet_interfaces parameter).
|
||||
#
|
||||
# Specify a list of host or domain names, /file/name or type:table
|
||||
# patterns, separated by commas and/or whitespace. A /file/name
|
||||
# pattern is replaced by its contents; a type:table is matched when
|
||||
# a name matches a lookup key (the right-hand side is ignored).
|
||||
# Continue long lines by starting the next line with whitespace.
|
||||
#
|
||||
# See also below, section "REJECTING MAIL FOR UNKNOWN LOCAL USERS".
|
||||
#
|
||||
#mydestination = $myhostname, localhost.$mydomain, localhost
|
||||
#mydestination = $myhostname, localhost.$mydomain, localhost, $mydomain
|
||||
#mydestination = $myhostname, localhost.$mydomain, localhost, $mydomain,
|
||||
# mail.$mydomain, www.$mydomain, ftp.$mydomain
|
||||
|
||||
# REJECTING MAIL FOR UNKNOWN LOCAL USERS
|
||||
#
|
||||
# The local_recipient_maps parameter specifies optional lookup tables
|
||||
# with all names or addresses of users that are local with respect
|
||||
# to $mydestination, $inet_interfaces or $proxy_interfaces.
|
||||
#
|
||||
# If this parameter is defined, then the SMTP server will reject
|
||||
# mail for unknown local users. This parameter is defined by default.
|
||||
#
|
||||
# To turn off local recipient checking in the SMTP server, specify
|
||||
# local_recipient_maps = (i.e. empty).
|
||||
#
|
||||
# The default setting assumes that you use the default Postfix local
|
||||
# delivery agent for local delivery. You need to update the
|
||||
# local_recipient_maps setting if:
|
||||
#
|
||||
# - You define $mydestination domain recipients in files other than
|
||||
# /etc/passwd, /etc/aliases, or the $virtual_alias_maps files.
|
||||
# For example, you define $mydestination domain recipients in
|
||||
# the $virtual_mailbox_maps files.
|
||||
#
|
||||
# - You redefine the local delivery agent in master.cf.
|
||||
#
|
||||
# - You redefine the "local_transport" setting in main.cf.
|
||||
#
|
||||
# - You use the "luser_relay", "mailbox_transport", or "fallback_transport"
|
||||
# feature of the Postfix local delivery agent (see local(8)).
|
||||
#
|
||||
# Details are described in the LOCAL_RECIPIENT_README file.
|
||||
#
|
||||
# Beware: if the Postfix SMTP server runs chrooted, you probably have
|
||||
# to access the passwd file via the proxymap service, in order to
|
||||
# overcome chroot restrictions. The alternative, having a copy of
|
||||
# the system passwd file in the chroot jail is just not practical.
|
||||
#
|
||||
# The right-hand side of the lookup tables is conveniently ignored.
|
||||
# In the left-hand side, specify a bare username, an @domain.tld
|
||||
# wild-card, or specify a user@domain.tld address.
|
||||
#
|
||||
#local_recipient_maps = unix:passwd.byname $alias_maps
|
||||
#local_recipient_maps = proxy:unix:passwd.byname $alias_maps
|
||||
#local_recipient_maps =
|
||||
|
||||
# The unknown_local_recipient_reject_code specifies the SMTP server
|
||||
# response code when a recipient domain matches $mydestination or
|
||||
# ${proxy,inet}_interfaces, while $local_recipient_maps is non-empty
|
||||
# and the recipient address or address local-part is not found.
|
||||
#
|
||||
# The default setting is 550 (reject mail) but it is safer to start
|
||||
# with 450 (try again later) until you are certain that your
|
||||
# local_recipient_maps settings are OK.
|
||||
#
|
||||
# unknown_local_recipient_reject_code = 550
|
||||
|
||||
# TRUST AND RELAY CONTROL
|
||||
|
||||
# The mynetworks parameter specifies the list of "trusted" SMTP
|
||||
# clients that have more privileges than "strangers".
|
||||
#
|
||||
# In particular, "trusted" SMTP clients are allowed to relay mail
|
||||
# through Postfix. See the smtpd_recipient_restrictions parameter
|
||||
# in postconf(5).
|
||||
#
|
||||
# You can specify the list of "trusted" network addresses by hand
|
||||
# or you can let Postfix do it for you (which is the default).
|
||||
#
|
||||
# By default (mynetworks_style = subnet), Postfix "trusts" SMTP
|
||||
# clients in the same IP subnetworks as the local machine.
|
||||
# On Linux, this works correctly only with interfaces specified
|
||||
# with the "ifconfig" command.
|
||||
#
|
||||
# Specify "mynetworks_style = class" when Postfix should "trust" SMTP
|
||||
# clients in the same IP class A/B/C networks as the local machine.
|
||||
# Don't do this with a dialup site - it would cause Postfix to "trust"
|
||||
# your entire provider's network. Instead, specify an explicit
|
||||
# mynetworks list by hand, as described below.
|
||||
#
|
||||
# Specify "mynetworks_style = host" when Postfix should "trust"
|
||||
# only the local machine.
|
||||
#
|
||||
#mynetworks_style = class
|
||||
#mynetworks_style = subnet
|
||||
#mynetworks_style = host
|
||||
|
||||
# Alternatively, you can specify the mynetworks list by hand, in
|
||||
# which case Postfix ignores the mynetworks_style setting.
|
||||
#
|
||||
# Specify an explicit list of network/netmask patterns, where the
|
||||
# mask specifies the number of bits in the network part of a host
|
||||
# address.
|
||||
#
|
||||
# You can also specify the absolute pathname of a pattern file instead
|
||||
# of listing the patterns here. Specify type:table for table-based lookups
|
||||
# (the value on the table right-hand side is not used).
|
||||
#
|
||||
mynetworks = mailman-core,mailman-web
|
||||
#mynetworks = $config_directory/mynetworks
|
||||
#mynetworks = hash:/etc/postfix/network_table
|
||||
|
||||
# The relay_domains parameter restricts what destinations this system will
|
||||
# relay mail to. See the smtpd_recipient_restrictions description in
|
||||
# postconf(5) for detailed information.
|
||||
#
|
||||
# By default, Postfix relays mail
|
||||
# - from "trusted" clients (IP address matches $mynetworks) to any destination,
|
||||
# - from "untrusted" clients to destinations that match $relay_domains or
|
||||
# subdomains thereof, except addresses with sender-specified routing.
|
||||
# The default relay_domains value is $mydestination.
|
||||
#
|
||||
# In addition to the above, the Postfix SMTP server by default accepts mail
|
||||
# that Postfix is final destination for:
|
||||
# - destinations that match $inet_interfaces or $proxy_interfaces,
|
||||
# - destinations that match $mydestination
|
||||
# - destinations that match $virtual_alias_domains,
|
||||
# - destinations that match $virtual_mailbox_domains.
|
||||
# These destinations do not need to be listed in $relay_domains.
|
||||
#
|
||||
# Specify a list of hosts or domains, /file/name patterns or type:name
|
||||
# lookup tables, separated by commas and/or whitespace. Continue
|
||||
# long lines by starting the next line with whitespace. A file name
|
||||
# is replaced by its contents; a type:name table is matched when a
|
||||
# (parent) domain appears as lookup key.
|
||||
#
|
||||
# NOTE: Postfix will not automatically forward mail for domains that
|
||||
# list this system as their primary or backup MX host. See the
|
||||
# permit_mx_backup restriction description in postconf(5).
|
||||
#
|
||||
#relay_domains = $mydestination
|
||||
|
||||
# INTERNET OR INTRANET
|
||||
|
||||
# The relayhost parameter specifies the default host to send mail to
|
||||
# when no entry is matched in the optional transport(5) table. When
|
||||
# no relayhost is given, mail is routed directly to the destination.
|
||||
#
|
||||
# On an intranet, specify the organizational domain name. If your
|
||||
# internal DNS uses no MX records, specify the name of the intranet
|
||||
# gateway host instead.
|
||||
#
|
||||
# In the case of SMTP, specify a domain, host, host:port, [host]:port,
|
||||
# [address] or [address]:port; the form [host] turns off MX lookups.
|
||||
#
|
||||
# If you're connected via UUCP, see also the default_transport parameter.
|
||||
#
|
||||
#relayhost = $mydomain
|
||||
#relayhost = [gateway.my.domain]
|
||||
#relayhost = [mailserver.isp.tld]
|
||||
#relayhost = uucphost
|
||||
#relayhost = [an.ip.add.ress]
|
||||
|
||||
# REJECTING UNKNOWN RELAY USERS
|
||||
#
|
||||
# The relay_recipient_maps parameter specifies optional lookup tables
|
||||
# with all addresses in the domains that match $relay_domains.
|
||||
#
|
||||
# If this parameter is defined, then the SMTP server will reject
|
||||
# mail for unknown relay users. This feature is off by default.
|
||||
#
|
||||
# The right-hand side of the lookup tables is conveniently ignored.
|
||||
# In the left-hand side, specify an @domain.tld wild-card, or specify
|
||||
# a user@domain.tld address.
|
||||
#
|
||||
#relay_recipient_maps = hash:/etc/postfix/relay_recipients
|
||||
|
||||
# INPUT RATE CONTROL
|
||||
#
|
||||
# The in_flow_delay configuration parameter implements mail input
|
||||
# flow control. This feature is turned on by default, although it
|
||||
# still needs further development (it's disabled on SCO UNIX due
|
||||
# to an SCO bug).
|
||||
#
|
||||
# A Postfix process will pause for $in_flow_delay seconds before
|
||||
# accepting a new message, when the message arrival rate exceeds the
|
||||
# message delivery rate. With the default 100 SMTP server process
|
||||
# limit, this limits the mail inflow to 100 messages a second more
|
||||
# than the number of messages delivered per second.
|
||||
#
|
||||
# Specify 0 to disable the feature. Valid delays are 0..10.
|
||||
#
|
||||
#in_flow_delay = 1s
|
||||
|
||||
# ADDRESS REWRITING
|
||||
#
|
||||
# The ADDRESS_REWRITING_README document gives information about
|
||||
# address masquerading or other forms of address rewriting including
|
||||
# username->Firstname.Lastname mapping.
|
||||
|
||||
# ADDRESS REDIRECTION (VIRTUAL DOMAIN)
|
||||
#
|
||||
# The VIRTUAL_README document gives information about the many forms
|
||||
# of domain hosting that Postfix supports.
|
||||
|
||||
# "USER HAS MOVED" BOUNCE MESSAGES
|
||||
#
|
||||
# See the discussion in the ADDRESS_REWRITING_README document.
|
||||
|
||||
# TRANSPORT MAP
|
||||
#
|
||||
# See the discussion in the ADDRESS_REWRITING_README document.
|
||||
|
||||
# ALIAS DATABASE
|
||||
#
|
||||
# The alias_maps parameter specifies the list of alias databases used
|
||||
# by the local delivery agent. The default list is system dependent.
|
||||
#
|
||||
# On systems with NIS, the default is to search the local alias
|
||||
# database, then the NIS alias database. See aliases(5) for syntax
|
||||
# details.
|
||||
#
|
||||
# If you change the alias database, run "postalias /etc/aliases" (or
|
||||
# wherever your system stores the mail alias file), or simply run
|
||||
# "newaliases" to build the necessary DBM or DB file.
|
||||
#
|
||||
# It will take a minute or so before changes become visible. Use
|
||||
# "postfix reload" to eliminate the delay.
|
||||
#
|
||||
#alias_maps = dbm:/etc/aliases
|
||||
#alias_maps = hash:/etc/aliases
|
||||
#alias_maps = hash:/etc/aliases, nis:mail.aliases
|
||||
#alias_maps = netinfo:/aliases
|
||||
|
||||
# The alias_database parameter specifies the alias database(s) that
|
||||
# are built with "newaliases" or "sendmail -bi". This is a separate
|
||||
# configuration parameter, because alias_maps (see above) may specify
|
||||
# tables that are not necessarily all under control by Postfix.
|
||||
#
|
||||
#alias_database = dbm:/etc/aliases
|
||||
#alias_database = dbm:/etc/mail/aliases
|
||||
#alias_database = hash:/etc/aliases
|
||||
#alias_database = hash:/etc/aliases, hash:/opt/majordomo/aliases
|
||||
|
||||
# ADDRESS EXTENSIONS (e.g., user+foo)
|
||||
#
|
||||
# The recipient_delimiter parameter specifies the separator between
|
||||
# user names and address extensions (user+foo). See canonical(5),
|
||||
# local(8), relocated(5) and virtual(5) for the effects this has on
|
||||
# aliases, canonical, virtual, relocated and .forward file lookups.
|
||||
# Basically, the software tries user+foo and .forward+foo before
|
||||
# trying user and .forward.
|
||||
#
|
||||
#recipient_delimiter = +
|
||||
|
||||
# DELIVERY TO MAILBOX
|
||||
#
|
||||
# The home_mailbox parameter specifies the optional pathname of a
|
||||
# mailbox file relative to a user's home directory. The default
|
||||
# mailbox file is /var/spool/mail/user or /var/mail/user. Specify
|
||||
# "Maildir/" for qmail-style delivery (the / is required).
|
||||
#
|
||||
#home_mailbox = Mailbox
|
||||
#home_mailbox = Maildir/
|
||||
|
||||
# The mail_spool_directory parameter specifies the directory where
|
||||
# UNIX-style mailboxes are kept. The default setting depends on the
|
||||
# system type.
|
||||
#
|
||||
#mail_spool_directory = /var/mail
|
||||
#mail_spool_directory = /var/spool/mail
|
||||
|
||||
# The mailbox_command parameter specifies the optional external
|
||||
# command to use instead of mailbox delivery. The command is run as
|
||||
# the recipient with proper HOME, SHELL and LOGNAME environment settings.
|
||||
# Exception: delivery for root is done as $default_user.
|
||||
#
|
||||
# Other environment variables of interest: USER (recipient username),
|
||||
# EXTENSION (address extension), DOMAIN (domain part of address),
|
||||
# and LOCAL (the address localpart).
|
||||
#
|
||||
# Unlike other Postfix configuration parameters, the mailbox_command
|
||||
# parameter is not subjected to $parameter substitutions. This is to
|
||||
# make it easier to specify shell syntax (see example below).
|
||||
#
|
||||
# Avoid shell meta characters because they will force Postfix to run
|
||||
# an expensive shell process. Procmail alone is expensive enough.
|
||||
#
|
||||
# IF YOU USE THIS TO DELIVER MAIL SYSTEM-WIDE, YOU MUST SET UP AN
|
||||
# ALIAS THAT FORWARDS MAIL FOR ROOT TO A REAL USER.
|
||||
#
|
||||
#mailbox_command = /some/where/procmail
|
||||
#mailbox_command = /some/where/procmail -a "$EXTENSION"
|
||||
|
||||
# The mailbox_transport specifies the optional transport in master.cf
|
||||
# to use after processing aliases and .forward files. This parameter
|
||||
# has precedence over the mailbox_command, fallback_transport and
|
||||
# luser_relay parameters.
|
||||
#
|
||||
# Specify a string of the form transport:nexthop, where transport is
|
||||
# the name of a mail delivery transport defined in master.cf. The
|
||||
# :nexthop part is optional. For more details see the sample transport
|
||||
# configuration file.
|
||||
#
|
||||
# NOTE: if you use this feature for accounts not in the UNIX password
|
||||
# file, then you must update the "local_recipient_maps" setting in
|
||||
# the main.cf file, otherwise the SMTP server will reject mail for
|
||||
# non-UNIX accounts with "User unknown in local recipient table".
|
||||
#
|
||||
# Cyrus IMAP over LMTP. Specify ``lmtpunix cmd="lmtpd"
|
||||
# listen="/var/imap/socket/lmtp" prefork=0'' in cyrus.conf.
|
||||
#mailbox_transport = lmtp:unix:/var/imap/socket/lmtp
|
||||
#
|
||||
# Cyrus IMAP via command line. Uncomment the "cyrus...pipe" and
|
||||
# subsequent line in master.cf.
|
||||
#mailbox_transport = cyrus
|
||||
|
||||
# The fallback_transport specifies the optional transport in master.cf
|
||||
# to use for recipients that are not found in the UNIX passwd database.
|
||||
# This parameter has precedence over the luser_relay parameter.
|
||||
#
|
||||
# Specify a string of the form transport:nexthop, where transport is
|
||||
# the name of a mail delivery transport defined in master.cf. The
|
||||
# :nexthop part is optional. For more details see the sample transport
|
||||
# configuration file.
|
||||
#
|
||||
# NOTE: if you use this feature for accounts not in the UNIX password
|
||||
# file, then you must update the "local_recipient_maps" setting in
|
||||
# the main.cf file, otherwise the SMTP server will reject mail for
|
||||
# non-UNIX accounts with "User unknown in local recipient table".
|
||||
#
|
||||
#fallback_transport = lmtp:unix:/file/name
|
||||
#fallback_transport = cyrus
|
||||
#fallback_transport =
|
||||
|
||||
# The luser_relay parameter specifies an optional destination address
|
||||
# for unknown recipients. By default, mail for unknown@$mydestination,
|
||||
# unknown@[$inet_interfaces] or unknown@[$proxy_interfaces] is returned
|
||||
# as undeliverable.
|
||||
#
|
||||
# The following expansions are done on luser_relay: $user (recipient
|
||||
# username), $shell (recipient shell), $home (recipient home directory),
|
||||
# $recipient (full recipient address), $extension (recipient address
|
||||
# extension), $domain (recipient domain), $local (entire recipient
|
||||
# localpart), $recipient_delimiter. Specify ${name?value} or
|
||||
# ${name:value} to expand value only when $name does (does not) exist.
|
||||
#
|
||||
# luser_relay works only for the default Postfix local delivery agent.
|
||||
#
|
||||
# NOTE: if you use this feature for accounts not in the UNIX password
|
||||
# file, then you must specify "local_recipient_maps =" (i.e. empty) in
|
||||
# the main.cf file, otherwise the SMTP server will reject mail for
|
||||
# non-UNIX accounts with "User unknown in local recipient table".
|
||||
#
|
||||
#luser_relay = $user@other.host
|
||||
#luser_relay = $local@other.host
|
||||
#luser_relay = admin+$local
|
||||
|
||||
# JUNK MAIL CONTROLS
|
||||
#
|
||||
# The controls listed here are only a very small subset. The file
|
||||
# SMTPD_ACCESS_README provides an overview.
|
||||
|
||||
# The header_checks parameter specifies an optional table with patterns
|
||||
# that each logical message header is matched against, including
|
||||
# headers that span multiple physical lines.
|
||||
#
|
||||
# By default, these patterns also apply to MIME headers and to the
|
||||
# headers of attached messages. With older Postfix versions, MIME and
|
||||
# attached message headers were treated as body text.
|
||||
#
|
||||
# For details, see "man header_checks".
|
||||
#
|
||||
#header_checks = regexp:/etc/postfix/header_checks
|
||||
|
||||
# FAST ETRN SERVICE
|
||||
#
|
||||
# Postfix maintains per-destination logfiles with information about
|
||||
# deferred mail, so that mail can be flushed quickly with the SMTP
|
||||
# "ETRN domain.tld" command, or by executing "sendmail -qRdomain.tld".
|
||||
# See the ETRN_README document for a detailed description.
|
||||
#
|
||||
# The fast_flush_domains parameter controls what destinations are
|
||||
# eligible for this service. By default, they are all domains that
|
||||
# this server is willing to relay mail to.
|
||||
#
|
||||
#fast_flush_domains = $relay_domains
|
||||
|
||||
# SHOW SOFTWARE VERSION OR NOT
|
||||
#
|
||||
# The smtpd_banner parameter specifies the text that follows the 220
|
||||
# code in the SMTP server's greeting banner. Some people like to see
|
||||
# the mail version advertised. By default, Postfix shows no version.
|
||||
#
|
||||
# You MUST specify $myhostname at the start of the text. That is an
|
||||
# RFC requirement. Postfix itself does not care.
|
||||
#
|
||||
#smtpd_banner = $myhostname ESMTP $mail_name
|
||||
#smtpd_banner = $myhostname ESMTP $mail_name ($mail_version)
|
||||
|
||||
# PARALLEL DELIVERY TO THE SAME DESTINATION
|
||||
#
|
||||
# How many parallel deliveries to the same user or domain? With local
|
||||
# delivery, it does not make sense to do massively parallel delivery
|
||||
# to the same user, because mailbox updates must happen sequentially,
|
||||
# and expensive pipelines in .forward files can cause disasters when
|
||||
# too many are run at the same time. With SMTP deliveries, 10
|
||||
# simultaneous connections to the same domain could be sufficient to
|
||||
# raise eyebrows.
|
||||
#
|
||||
# Each message delivery transport has its XXX_destination_concurrency_limit
|
||||
# parameter. The default is $default_destination_concurrency_limit for
|
||||
# most delivery transports. For the local delivery agent the default is 2.
|
||||
|
||||
#local_destination_concurrency_limit = 2
|
||||
#default_destination_concurrency_limit = 20
|
||||
|
||||
# DEBUGGING CONTROL
|
||||
#
|
||||
# The debug_peer_level parameter specifies the increment in verbose
|
||||
# logging level when an SMTP client or server host name or address
|
||||
# matches a pattern in the debug_peer_list parameter.
|
||||
#
|
||||
debug_peer_level = 2
|
||||
|
||||
# The debug_peer_list parameter specifies an optional list of domain
|
||||
# or network patterns, /file/name patterns or type:name tables. When
|
||||
# an SMTP client or server host name or address matches a pattern,
|
||||
# increase the verbose logging level by the amount specified in the
|
||||
# debug_peer_level parameter.
|
||||
#
|
||||
#debug_peer_list = 127.0.0.1
|
||||
#debug_peer_list = some.domain
|
||||
|
||||
# The debugger_command specifies the external command that is executed
|
||||
# when a Postfix daemon program is run with the -D option.
|
||||
#
|
||||
# Use "command .. & sleep 5" so that the debugger can attach before
|
||||
# the process marches on. If you use an X-based debugger, be sure to
|
||||
# set up your XAUTHORITY environment variable before starting Postfix.
|
||||
#
|
||||
debugger_command =
|
||||
PATH=/bin:/usr/bin:/usr/local/bin:/usr/X11R6/bin
|
||||
ddd $daemon_directory/$process_name $process_id & sleep 5
|
||||
|
||||
# If you can't use X, use this to capture the call stack when a
|
||||
# daemon crashes. The result is in a file in the configuration
|
||||
# directory, and is named after the process name and the process ID.
|
||||
#
|
||||
# debugger_command =
|
||||
# PATH=/bin:/usr/bin:/usr/local/bin; export PATH; (echo cont;
|
||||
# echo where) | gdb $daemon_directory/$process_name $process_id 2>&1
|
||||
# >$config_directory/$process_name.$process_id.log & sleep 5
|
||||
#
|
||||
# Another possibility is to run gdb under a detached screen session.
|
||||
# To attach to the screen session, su root and run "screen -r
|
||||
# <id_string>" where <id_string> uniquely matches one of the detached
|
||||
# sessions (from "screen -list").
|
||||
#
|
||||
# debugger_command =
|
||||
# PATH=/bin:/usr/bin:/sbin:/usr/sbin; export PATH; screen
|
||||
# -dmS $process_name gdb $daemon_directory/$process_name
|
||||
# $process_id & sleep 1
|
||||
|
||||
# INSTALL-TIME CONFIGURATION INFORMATION
|
||||
#
|
||||
# The following parameters are used when installing a new Postfix version.
|
||||
#
|
||||
# sendmail_path: The full pathname of the Postfix sendmail command.
|
||||
# This is the Sendmail-compatible mail posting interface.
|
||||
#
|
||||
sendmail_path = /usr/sbin/sendmail
|
||||
|
||||
# newaliases_path: The full pathname of the Postfix newaliases command.
|
||||
# This is the Sendmail-compatible command to build alias databases.
|
||||
#
|
||||
newaliases_path = /usr/bin/newaliases
|
||||
|
||||
# mailq_path: The full pathname of the Postfix mailq command. This
|
||||
# is the Sendmail-compatible mail queue listing command.
|
||||
#
|
||||
mailq_path = /usr/bin/mailq
|
||||
|
||||
# setgid_group: The group for mail submission and queue management
|
||||
# commands. This must be a group name with a numerical group ID that
|
||||
# is not shared with other accounts, not even with the Postfix account.
|
||||
#
|
||||
setgid_group = postdrop
|
||||
|
||||
# html_directory: The location of the Postfix HTML documentation.
|
||||
#
|
||||
html_directory = no
|
||||
|
||||
# manpage_directory: The location of the Postfix on-line manual pages.
|
||||
#
|
||||
manpage_directory = /usr/share/man
|
||||
|
||||
# sample_directory: The location of the Postfix sample configuration files.
|
||||
# This parameter is obsolete as of Postfix 2.1.
|
||||
#
|
||||
sample_directory = /etc/postfix
|
||||
|
||||
# readme_directory: The location of the Postfix README files.
|
||||
#
|
||||
readme_directory = /usr/share/doc/postfix/readme
|
||||
inet_protocols = ipv4
|
||||
meta_directory = /etc/postfix
|
||||
shlib_directory = /usr/lib/postfix
|
||||
|
||||
|
||||
# Config below taken and adapted from
|
||||
# https://github.com/maxking/docker-mailman#postfix
|
||||
recipient_delimiter = +
|
||||
unknown_local_recipient_reject_code = 550
|
||||
owner_request_special = no
|
||||
|
||||
transport_maps =
|
||||
regexp:/var/lib/mailman/core/var/data/postfix_lmtp
|
||||
local_recipient_maps =
|
||||
regexp:/var/lib/mailman/core/var/data/postfix_lmtp
|
||||
relay_domains =
|
||||
regexp:/var/lib/mailman/core/var/data/postfix_domains
|
1
hosts/nougat-2/pubsolar-domain.nix
Normal file
1
hosts/nougat-2/pubsolar-domain.nix
Normal file
|
@ -0,0 +1 @@
|
|||
"pub.solar.b12f.io"
|
7
hosts/nougat-2/transmission.nix
Normal file
7
hosts/nougat-2/transmission.nix
Normal file
|
@ -0,0 +1,7 @@
|
|||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}: {
|
||||
}
|
21
pkgs/concourse.nix
Normal file
21
pkgs/concourse.nix
Normal file
|
@ -0,0 +1,21 @@
|
|||
self:
|
||||
with self; let
|
||||
pname = "concourse";
|
||||
version = "7.9.1";
|
||||
tarfile = "${pname}-${version}-linux-amd64.tgz";
|
||||
in
|
||||
stdenv.mkDerivation rec {
|
||||
inherit pname version;
|
||||
|
||||
src = builtins.fetchTarball {
|
||||
url = "https://github.com/concourse/concourse/releases/download/v${version}/${tarfile}";
|
||||
sha256 = "sha256:0w3q4bj9wxw0w7jrk9r8va5ipz26k2szsfx34ss9hh2bbpp7mryw";
|
||||
};
|
||||
|
||||
phases = ["installPhase"];
|
||||
|
||||
installPhase = ''
|
||||
mkdir -p $out/bin
|
||||
cp -r $src/* $out/
|
||||
'';
|
||||
}
|
|
@ -3,6 +3,7 @@ with final; {
|
|||
# keep sources this first
|
||||
sources = prev.callPackage (import ./_sources/generated.nix) {};
|
||||
# then, call packages with `final.callPackage`
|
||||
concourse = import ./concourse.nix final;
|
||||
import-gtk-settings = writeShellScriptBin "import-gtk-settings" (import ./import-gtk-settings.nix final);
|
||||
lgcl = writeShellScriptBin "lgcl" (import ./lgcl.nix final);
|
||||
mailto-mutt = writeShellScriptBin "mailto-mutt" (import ./mailto-mutt.nix final);
|
||||
|
|
BIN
secrets/concourse-db-secrets.age
Normal file
BIN
secrets/concourse-db-secrets.age
Normal file
Binary file not shown.
47
secrets/concourse-secrets.age
Normal file
47
secrets/concourse-secrets.age
Normal file
|
@ -0,0 +1,47 @@
|
|||
age-encryption.org/v1
|
||||
-> ssh-rsa kFDS0A
|
||||
O2w0L1wXVm6+y3ZHO0plWlWfxd/gKE5P0JRSnRQ9hAQGdjNRbsI1nfW54Ce2uSx4
|
||||
1rre6tIWLjkInnqCfkkAYH03hN8uDmD0fZX8rKLcyX3GjL1rs4zVu1LDgMz1dCtk
|
||||
yVdM3RTR4WoPOsIdUCCHMHi1r53VsJ8QQ1FLxHknMu1gaI95AshN1+q3SqZIJAR3
|
||||
9VsPi+3K9A6H1fqPzVTs+2WLvDIxsziRlhkIzBBmuhkwWIVsqcS+K5q2+lexVvKQ
|
||||
iDQpDUHOunuN7sS63DWonjLHQwwOKRhaP7l8H+vZxENGtKDOZzcZqynL1Esy/J1M
|
||||
g4MAGyqYb+ViNYnAZTUBWmhzWSlYhNU6wHICy8MPb5VqO5N5ywz4Bzyimj9q8KEP
|
||||
IpNyjbtP1Twp50AYNrxySSo+Hi+LiAbO560H1Qr4CB921piPotX3+B/vlAGUfP4r
|
||||
liU6DeiAHdq1DSzuDXm12TWwKEobfqNq6ofyLUCaAbxXBAYLfMUcxp3GfmUgDRO6
|
||||
u7y9UlGTg7sCfn3esmrFjA0QIS4AtOR02JDTstT+X2eU+oNhZ6tNAnM1CQs9mSpA
|
||||
3lhGLbs3bCfgP5oVdV2lmecHkp3h/ubIPAQyHKxK7sq/3Mz8AmqWijD/D4n4SiPl
|
||||
KtxDJgG1Vz56kYiUam5Xe2Lounics2gnEO4DRgj8vwk
|
||||
-> ssh-ed25519 TnSWKQ L1FW6RvYZsZnjIw6+RkLwgNp7U/qWim1nATWqzTazxA
|
||||
KKICuaBcXT30LH9QmWu3G0n45ccXWoWDWzJ0yKobtME
|
||||
-> ssh-rsa 8daibg
|
||||
dG9a1OcqCQuKlkutuJzB77OuwKnD+22kDdKPW4ztJT5tkT/vDBcJpmWN8/YQjrsW
|
||||
HUSFimlSs1Cvs1ICLjA/w1iaUgZdTTB9t1L+vNKjirbd+BqdAZhi+B8Q1cBHbX5d
|
||||
aArCQba2UoYg4NL/jU3/fqCujWe0qyWu5IlXL7uP5PQI3f+eDKEqah2sEYI8TBkB
|
||||
auNlxibuz0pHTUTZiftPhXtwuTkbX4KzcXOg7811J5ZW4rfPyCfnIMqmHydWG8Kf
|
||||
6qwpogv9ISO426kAZBUhAnor1sPePhm2wNf7I1MpCulJq6Yl6cJ0hH5EoC51yvZB
|
||||
UGlwmItV8t0derPyp9OlNAy8SFRiikUa/rNZFPNnQwK66+J/rhn39tWCvWdH1r1s
|
||||
T8lAvRBU4ynyP7H7Xa3eFAijxT0ztjGbjDE9nH+V9tjiKFoo8/nr0SHTgjd8Ckpk
|
||||
0IUVlru5pPlIDX2f5Z4sxHabXtu//zqcn5TgoYauTWa5TenmhSeRBOUystJQYV88
|
||||
IFGT9OfQEpadD+JoUuRz4r+WcnrVf54uYdr9n8PazrmGmRV0oM9hW8rEMUJ4FMnY
|
||||
a+3nOC4zqmMgfwL+w3TC94q5gKTtEkY4csLWE1zTo5HxewPtyoCvjecAA6h8EnXE
|
||||
9/SnCtHVM42IDwBXda2YltbozAhro+O07ngKYI3GaFg
|
||||
-> ssh-ed25519 2Ca8Kg uFzUXtXy8l0c6MXtPp7t4G2NIcsPxKApqxQNWreLO0E
|
||||
t4QgjwiEAsYVgChi6cSZ7e0lxQ9UK50UPiXDTNQeC/Y
|
||||
-> ssh-rsa 2ggJWw
|
||||
c79JRDp3Io0bqtk/fxgvnVQo30ESXDH1og5IYRliMI6otUeDjcLAF8x30h+7LL8y
|
||||
4xj38jx8FzPje6wEcMXQxqIxHdHZHEpUyxnu1H1ZfJX63LoqaD9BVEWrI+bWqLgo
|
||||
7RXPFX5zKxeBZjcMHh+Z+pK/8I/S7p9ZYbI7n5TVqI5VIkZPy3fySLjGP5BH55is
|
||||
Ziu80pXyknoqYz9/FPtmscb1IYGt82wewM2Q0rnnNTFEyg+0aG4wS3BCyf0tzIJq
|
||||
066Fi8tZ8jv9BVOnlAtVV6kjQohxCsvcuPsgNja0ewr7wAg7UQd/DPkA0jqgHiT8
|
||||
F3qIsouJZHsl9w6NtE9d/IdKYGfDZrcxTxhE/WM7dYIeYhT0X/Z/CCApRHtMNZZj
|
||||
DXgU2lnMycBSSBs45f/rsqosZVPXlVt6jnPyxspOxjp5s82ODeufFB+R0Es/eqdM
|
||||
ubImNOAQT/GdtXona52/C002W3JSFfT7gg3O/8FfKMVwfn+eYvDv3bEMXLMjkeR3
|
||||
|
||||
-> -Fh\{x.n-grease v
|
||||
QdBJf4GvnkoWIxTgdT6Lmjrm05ojy7RIUUYjE8fOlMXsQQkkFatIAGCKJeKVOggW
|
||||
ZfNrjYmvdbdmq3bxkOc7JnZEg1WFRrgwObdiMWn0B75NMuMvKpRY0oPe1+OrjgFw
|
||||
1Qk
|
||||
--- JoZy3uGEHXt9eoUUr/dZMc0Rn6XrcNLTZHbniBgY/Zo
|
||||
¦‚Ÿ¡<EFBFBD>p ìzîÔgoû)LýþÑÍ/éÆà¡hħ?uà¶ÕÆZ1¿lÂsŽ FÝ¢«W‘/ZÄNA˜mÏ¿3¥”Ä J> ´*»:BZpÔ2
|
||||
2z|8´õx6YÌ´+mOn~è£~‡Ÿ¹
|
||||
Jð¦ùȵ¬¸akšê[íÄÙi…÷ù9<C3B9>§ø¤k”~TÚãVvO&“…é•gXÒŠê ô•ëC‹Þ{T¬$½p\ÌÔjvkTzT_ñ˜_Ä7&ÉxMžw :—:Í¥s6™´W©*”/›VQ¶PÉåî7Ë!L<>V}²½M\<5C>‰ðõÍŸN¿Nvv«!ÞøÅK“Fœ`à9ð.´ÍØA/i¾èç_sÃ…#>AÊûŒbZb‰I
|
BIN
secrets/concourse-session-signing-key.age
Normal file
BIN
secrets/concourse-session-signing-key.age
Normal file
Binary file not shown.
BIN
secrets/concourse-tsa-host-key.age
Normal file
BIN
secrets/concourse-tsa-host-key.age
Normal file
Binary file not shown.
BIN
secrets/concourse-worker-key.age
Normal file
BIN
secrets/concourse-worker-key.age
Normal file
Binary file not shown.
20
secrets/gitea-database-password.age
Normal file
20
secrets/gitea-database-password.age
Normal file
|
@ -0,0 +1,20 @@
|
|||
age-encryption.org/v1
|
||||
-> ssh-rsa kFDS0A
|
||||
j4vAJUTfwqSNwCxwbD8CQ1NCosHwl7WeWQ6yzJTVTS91GuBiPHy31sB4HsoLIvMS
|
||||
S6fqRaDWytvcQqGu1zrKISVER8nJBeprhaDV0wK4cmDPAgnkoPBOzp6ZEXGoEhM9
|
||||
pQBosLYGtInnCXVbdd2cWCaKLcmjMaItZzeC/xcjgAmkWOhbkt5DQbcxoplcPdJ3
|
||||
v4UGpVSylpO99Th3UyWQ0uQ66I2hkvipJaEbeXZakLdb5RWRDQAdjHQVThjxaNr6
|
||||
IzQ5dlIHPbH1fUSkj7vC5RyTbJC9o2MaiO4TnrMrwqfmrN18KvmtrzIsaeH6695B
|
||||
2hwpaQzJRt/eM9aWX29eRGzaaZPKpajhNlZO6ADGDnBtLrlFRsGDkxdaSVCknZce
|
||||
e7xo/MHtjs6HrITUSkrclP9uiNrsgz9lUd0j6bqZJMEsIAPlKXsckhoinr9pVxWG
|
||||
wHhwaYCFKh0JGO2x/LFwTfhiLWtUGWWbv24wU2nKXInQE2BNKz/kDNoVSKnXwxUF
|
||||
Y8FNR/SnLpYrVLvJozWGs5XaIDNmmnKspBzwA4T/uUttt/VsZkpDY1MC+M/l0SRv
|
||||
iEhzFiDcR8ZLqLOm40F1ZcuDjpMnc26Vw9MnJlU5drkC68UmSnhdtfwZrz8tIjM5
|
||||
AE2xrygSJIdcRBwXfr1WCpgT8fkXmloumGbeAeC7MGs
|
||||
-> ssh-ed25519 cakP9w u0fC9unKSlgCaf8LeexabNZHN5TiE7Ji9edwTAY2hy0
|
||||
R47comlzrdTwh5/HyYcJWnbaJXz5Gyiyl5grPhWA4FE
|
||||
-> {SpZO^-grease V[ P=
|
||||
oCMLf3Ix+ganP4GNp1mFZvfeJPp5ohdIyR8ZWUstJAmxJ8uja6MHc0JOjnWfGvtW
|
||||
k4oWmmkOrRx6
|
||||
--- PMDSGvBkvUV+g/tYN3n93q7ikX3vwsd9yvHi1PvNjjg
|
||||
-7–pŒl?PÅM®PØåªø€:ÃËB}m3&Ö]ma1¸«¥O-ç$íéNÓ!7gÏÜL|¡±w¡=LÙ5‡¤ò
|
20
secrets/hosting.de-api.key
Normal file
20
secrets/hosting.de-api.key
Normal file
|
@ -0,0 +1,20 @@
|
|||
age-encryption.org/v1
|
||||
-> ssh-rsa kFDS0A
|
||||
MLbUT2OZ5uLq2uC4GdBNhQqrN8BjF3FibWT5NpfcL+ryr5wI1HfHnTINQR1SfcP6
|
||||
e7YF2+lJXiI+Clp+V3/eG5mDMXo358lr1usQPo3AJp0L/F+ZXuYgXIYgp/H6CpX7
|
||||
ztVM3BavlwvKibiFzpJVESIQW/aMp+fotTG5BBCzQ9P5ejpRCyBnw023VXG4bul6
|
||||
kSBbjaclmXAB/kErB/CBrQX8khYzy/sPWMeyKfNpQNRebwHfwifSKtwvl9CrII0S
|
||||
6UAK6oKhi+5heqCtn0t2ToY+Jo9ccMjf1tKuQkUkT9gxJqalYakK9Z/Cn1YjteS1
|
||||
/QBE+pVNJYtqeND2kWoh7GDgHMN3RpSOZTTfLYWMatfwdZn78y5Qnri6GxKMMpcH
|
||||
HJjFR3/u08sa5Z6QJN5ajMCze5QEVCfkbP7OUvdD77JagoR2TGphJXHWuHBBjNT0
|
||||
67GnaVjtjBSkPc2wHaB9jXCLcpkYtx2JwvcYIBmyzu+uw3dVXekT54dXMckW04B9
|
||||
2A+zH35yNX7cG1BdAaqXsj0q8XHLi+ZyyZBB/OSXFaz07JI8Uo7V17MU6N+yFCbn
|
||||
UeIh82gingQU1+OBRSi1Qbee76RqRGOB9oJywxWYoj0tfCb5j+CW0UH18rKRCy1p
|
||||
nbyIY2mp1pVMVnkv+UH5HDJZYTVt6H8HllKZcqy8tUQ
|
||||
-> ssh-ed25519 cakP9w r7YM3I761Ly8mdPE5Aue4piOtU2WuBCX/ZkuODcC11E
|
||||
+FGBvDNQiChuuYWGzo9lKiFGWtkGpd+h+zbi0fjR610
|
||||
-> f(eo)$--grease = zT<uk K? Ijd3$!v
|
||||
H/OGi9ibCTdNA59VlE4PWHH0sxeAehnSHPboQdGqc+mRBWhmyhuN0flH0lSc+Psq
|
||||
NM0a5Cwz6j3FYrQDi2H20oFCLCaHNm4UDkzMhhL/0UYvgQ
|
||||
--- OBqMSFnHs3uuRccjWbid3GxwdVDy+5rbWohAFal4HGM
|
||||
¿Àä]y÷=¡0µÑYÒ†¢•÷jQ˜ZŸÓ€^þåÊBåò-$'mÄ…þÖ<C3BE>ݵ•ö:Rš/M{^–ƬDdzlFGo]ß`‚£›î¤D”î
|
20
secrets/keycloak-database-password.age
Normal file
20
secrets/keycloak-database-password.age
Normal file
|
@ -0,0 +1,20 @@
|
|||
age-encryption.org/v1
|
||||
-> ssh-rsa kFDS0A
|
||||
DWQcu9+8Tt6PbnhhtjaEh4JwKckPzGp8T886OitKmT36ONeX1xm4rxUV1BlZJESH
|
||||
bBUorgCjlVeNadhrvMH6f79iq84Itz3wFsRn3wtXTHPjyOjXKq3mBFCZchkNQXrQ
|
||||
kAlHVSU4KxArWdDgxZlSDDjqVKUO2otOax0jQIrATyoyXxydv3IrY+I/QJNXyMVV
|
||||
TWWur2MjLfRtXf8pKhKHhZMGthOtnYRYJplR638hw4TQ0j4/7J34qcZZgNoo4pUY
|
||||
FHO1xLqxdRzMiE5Kn7drhJ667QeEANZUr1sPjejXahMx/oYatpZ7YxDk2l8P4bcO
|
||||
qAiQ5Z3h1wfhfhHJWLCXac9jBifZeMXXsi43lB7/A+8OCPPZbJam6ng9Nqi6q52S
|
||||
nCwY54c50mDp1iS8b8coBnVqr4JPA+mipy31KGmbysxjKRV7SovYuPq6xzGzL9gO
|
||||
nAxpvwGuPShuKQMQ373u0NL5Fx3gnSwBpDax9Q8ZIvkn/iGIjntQj8IaDDXUtOUg
|
||||
6r3wQD8m8C54q8hdOeb8dvDTb8YkXJGumikOwx04KhhX/MJbIMpwSmhZGHdCY44v
|
||||
qhTQcnudnPUskTZsenY4pw9LOdzuVeLqGL2359qvw8w8KTNtZfeif0xCpWBKMOw8
|
||||
F3wdYRaowGp0Hqi1wb+mKtiz4Tyx93crkflrpxs5hT8
|
||||
-> ssh-ed25519 cakP9w m4+f1g38ZLRWqO1eKOSnu/0wJ+ou4j/4VgR8IJhh9Bc
|
||||
1MkqVLAk5hZyyvjVSU7ScIitGkIiQlCl7oxJCBw7xmE
|
||||
-> Bp=k^MJA-grease
|
||||
iP4iWQsV1F2QEiShf0j9AhCUq+SXOxQ
|
||||
--- d1wE82sM45YxhJkxchil/8TFhZMjyDVSySvgS6BQCck
|
||||
dV¿ÏQ“rJ8¿ýörøg(¤âì‡
|
||||
êiàŽfï6O¸#ßãõWj,ÌÛdq—<xŸòOÑŒ^}-p9<70>`B
|
|
@ -14,6 +14,8 @@ let
|
|||
droppie-host = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBDuXuPPDXTyJgy4JRwbKcPbawvVB1Il2neyRWb4O5sJ root@nixos";
|
||||
droppie-user = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCnYTlTmHCl6LOkexqRR9LqjOoFgt9TQ4VzHQGRHJMzF/AGcDRoqC+pBLFSTzRb5/ikAOsb32XHyKVg4nNdJeQshO11QtDmkCB02D/XcIXxnNQ5A8CztT2az5xJtbbWSdamMnHBLcqLiwoLmXbERpdlt8jNqMHrz+bjCUGYVAFSfc/WdIs6EATJ1eF0VFxv7nUh4qhgStABSwhNsnoYOC/DOBSA9aBP1f5Fz9QHUioPTGi2hRwbTbtFUvTrymPpWVFRApa1zvGXcr4YUCm7ia1ZlZKzRpsPkwLxb8Omm4bGmR0cAVwVhVRySnhpCTwbIBLyw+H8PvKWBBba1NAKyMij root@droppie";
|
||||
|
||||
nougat-2-host = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINELr5Bvr15GqCHevg9QP8oYFgmaRUUHcPFf4MZho9gI root@nougat-2";
|
||||
|
||||
allKeys = [
|
||||
bbcom
|
||||
|
||||
|
@ -44,6 +46,12 @@ let
|
|||
droppie-host
|
||||
droppie-user
|
||||
];
|
||||
|
||||
nougat-2Keys = [
|
||||
bbcom
|
||||
|
||||
nougat-2-host
|
||||
];
|
||||
in {
|
||||
"keyfile-biolimo.bin".publicKeys = biolimoKeys;
|
||||
|
||||
|
@ -65,4 +73,16 @@ in {
|
|||
".fwknoprc".publicKeys = biolimoKeys ++ chocolatebarKeys;
|
||||
|
||||
"cat-test.ovpn".publicKeys = biolimoKeys ++ chocolatebarKeys;
|
||||
|
||||
"hosting.de-api.key".publicKeys = nougat-2Keys;
|
||||
|
||||
"concourse-secrets.age".publicKeys = nougat-2Keys;
|
||||
"concourse-db-secrets.age".publicKeys = nougat-2Keys;
|
||||
"concourse-worker-key.age".publicKeys = nougat-2Keys;
|
||||
"concourse-tsa-host-key.age".publicKeys = nougat-2Keys;
|
||||
"concourse-session-signing-key.age".publicKeys = nougat-2Keys;
|
||||
|
||||
"keycloak-database-password.age".publicKeys = nougat-2Keys;
|
||||
|
||||
"gitea-database-password.age".publicKeys = nougat-2Keys;
|
||||
}
|
||||
|
|
51
secrets/session_signing_key
Normal file
51
secrets/session_signing_key
Normal file
|
@ -0,0 +1,51 @@
|
|||
-----BEGIN PRIVATE KEY-----
|
||||
MIIJKgIBAAKCAgEArbWytCB8DY+iqac2glQQ6gNrX5rmIVRK3tc6+qo8TerU13Q6
|
||||
3NCbCUtdTn10e9giFMynFcVhhBaRzGdNxA2Z7fCNbqCbrarHzMXEEkSeW4MMbsM3
|
||||
xuL65pVgokcf8F3ernUS9d5YlG+LO8TxMRfb9LnZDafds3jbaWEs26k/SKrad+76
|
||||
F+rlUXkInRzYdUf7xP/v7ECuHbEuT+SW3sQIRIBMssnTxZdxQyffDyzYUXldwumI
|
||||
XMSAXPCkzG+X2MTPFHtlpSM+8GBabIQ7Xf54oLzfZVMhlxDCQhnQDQ7s2JU+hOJq
|
||||
GeR3FPIiN5x5oBD2y2cydovjnvmixis2BDXYvM5jPYUV4q5kVukcQiP3tEZDEhSx
|
||||
D0yZmN5V3PjZS7E0xG0juoUYjBNxiCtRe0eK2oFD5K+cK1fzTg6XNGwKOR+ip9gH
|
||||
5vVHO5btbd4OmwvfUf5qNJwkcIOPjBtI65URvh39Furc9PwzoYIQx4JnCk0JRXS2
|
||||
lUJXHjzfQMsijlK47+AQ7T8RsnqQkvEvH80N9mpSRZQLegdxczkUEYLMQG5JFnzF
|
||||
vBzOM76AhkgWeyn7fiq9j+FqkTXSGXxku9pz4jhPqOWpX28HyJcYOgOe61CkyWO/
|
||||
D/EX2BV2z3ld7Durl0/6bOIb2bWFXn01NL1O3CnWvcL03n5DHuQ5tP1PCZcCAwEA
|
||||
AQKCAgAXEK8/16hhLJdOq5NDTuJIEFgrg6fW+RhP6og8TGphdjL4wMgoFdLgMw+a
|
||||
onHbF+G+nUX6UBEYtt55I6Zhx+SOgYhmDhFdx/VrrT7RpibYw9fcxTMcx3rFL0R7
|
||||
h7In+m7c/1KbLwDYBM+aChZ0jFR6dErr00RO1ldb8LlCGYD7pyQHFMZEcr4sSUPp
|
||||
iLD9MaeuisVSu2vjKWma1iFqRuFKJzcH7mCeNfOmFR87Jps6hkD65oNivfzFWnan
|
||||
ZpHlCIzujUv712g+Bq07B3vSiT1/KlUHYThulJ0WpdLISRkN0RNSFbY85ech8ty0
|
||||
QaSsqlP6wiMjNoPs0fzZD1fGy1eR0lzAunDtXwQqmHFQMw5K9AfNpYtXea6tyPJj
|
||||
mZvRe3rnb/NBf4nnnREVg3UpwlPrqWNC+0As3sE1Y+Vs/CkoCiGdjIDq+FglVKAy
|
||||
a13gFht52Vc89pmjQDqCIpaIkqe33OGf9t3LyII1HGkx+2T6J97r6brPfXBO+9kr
|
||||
kA2E+R0emSOY6GXbnbUrXU+Wq+KRH7lB05/5VCpk+fFv2hpUMWRlXwQ1w5f58zor
|
||||
I1OQxjmNu5rFaDCLWbEmx2z5tWpQi8x33KBd/GUHrmKz6FMdOMQGjbAvixgC46VT
|
||||
0IwwNN3hx7hSOzMzzMcjZSFd/YO/0Krd5wkwPqyaJIjwPhAFgQKCAQEA1L8FAMIo
|
||||
VLWNASppPeXHmeHWY+b43S3iN9LHcasp/hHzEav+OyB1Xuaj9JHCmF/mytnTCd2v
|
||||
64HMk1tWiayHk887p5UVDL54mT1VG2Lx/n9z3BRSMan8rQaI/L+/QlJTOtnhn7g+
|
||||
OpSGvG8xy7TLz+xVxPjrzgMGJVk0Gx41VJA2Xm4WKPsHNUZiMyj0GiUSWyCaaZXU
|
||||
LdC2o8w6KZMPwy1zzOydIad2f+bGK8aqRFTI1R4+8NHDqdU4mcuFC/fC4ZVz85f+
|
||||
A9MOxS7CoVZpTcno1fbzoKEJ0mlYPn8tCLLOuPHTlDMMP0JSpwMBhV/961jHu+DP
|
||||
4/1IKCxUckSadwKCAQEA0Qbq0R6ahWmMhWU1NAO+mC0sABKajZmBHqb1ZzChKVQJ
|
||||
lJP+Vu5JsDoXU8tk6k716O2eIp8AMQQBenHpfMAQLVf97NS9g3pqPfOrdDtqVRwW
|
||||
thon6EEXO4G0qEDyKEJBgdYMRQgKiAUys1LoeuO9QfM6J7A2EU/JXQFyu97Hh2xW
|
||||
PZ1d8OGJ7D8J5UyZYvj7htt8Tj0EwAq6OD9BzFy4D4aFG/GxI1g8D9JXRx/cYGAp
|
||||
+WjrxUtT+4cwxNWMKurLyW4F1/8Qb8Pu2W6MEHg88KM8wolptMta5H6+MO0y13pD
|
||||
znSB5rnSOnSzGj+F6t08m0IMVGq+w8lu6Z6BWEGx4QKCAQEAlJns06/K3giGOmc2
|
||||
Zb7nogwGZXfDIzNWjSmUmEg3p7k/8HsTtJcihKxTn5RkuWxbWBu4dm6736OlktQ8
|
||||
6SNy/ALHp3HR5znwIRGfLeb6I4tBEVu8YeZbkTw8WVdSL/AzJKtmFttp1B9E0cBV
|
||||
pvVdW5m3+0Ln6tlf5JyfccWy+KNW5rS8k9lsGoFUPGoBv3Vfkfl/Afte3rWnrVgM
|
||||
1FddrjZEacJoq0Y+1m4KxC8bZWlXcs2Sp0HOCwXdaEepYkeof0uWV3M2QdOdwIu9
|
||||
9VXXbjd3hGTfnbZ+ltNwiQ7qFOZY0QRRhnX1uwYHl5LY8CGxyj8UHJ6Wd6jGSxFT
|
||||
1xEmVwKCAQEAgdbfI5jz+O0waWgNnUq6KILeswjbUhvJFcY156xQX4ChFta7BTqt
|
||||
MTdUaCuOevEjVVXMhcrobooDdRCvLVuMcO4Yf/VB5xqyRdtHZELH8Sgqf2FN6roL
|
||||
+V2/X0hAY3uMf177biHpkMZR0Qwt9q/iTsYMGL0fSK+b8BbHMyXWISvNgiZvRQKE
|
||||
Dui1d+aV3OG2M/XAiETk33mKZQf+EjiB6LrxkgMWulLDtDw/FKIY3RC+4fsngP0i
|
||||
pLo8M/hGQh5pCa07GgmJJzO4+PzvKgfWKs/rHRgIPlKXGhoUgAXHMAv1dJfwXOaO
|
||||
TNtSqXpN8C8Ox45GZGWOK8XDDID17WGZYQKCAQEAtClJcYajH2wy9HKT0c1B7KZm
|
||||
ppOb7NunZcycY4PPqv2GPQNgC28SgtGLu0Vsa+Doca1pbMWLCNbyINgC4APkhS03
|
||||
l2+UEIwInyJw//Ahwuo94ItWd3lyuIDD1BfbxgdpESelJ7RiRXfvxEjVwvNrI27Y
|
||||
uzrsOIwfOof/rMP2rBhzE855s0NnHuYQa6Wh4V0WYGA36A492P5IlxLEsJMg2Emr
|
||||
s3rrF8qVwBNCrNe4ffA8IfZUKy2nrp8Y2CRfS1e622GSbcP3g9FvW/QaEJ25W93Z
|
||||
js/KpVdC78ACKa6njWJoUNfoGZL3Gvwt9ZMdvQpJwl7r/DIB+5Mh7yWZ9PVjSQ==
|
||||
-----END PRIVATE KEY-----
|
1
secrets/tsa_host_key.pub
Normal file
1
secrets/tsa_host_key.pub
Normal file
|
@ -0,0 +1 @@
|
|||
ssh-rsa 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
|
1
secrets/worker_key.pub
Normal file
1
secrets/worker_key.pub
Normal file
|
@ -0,0 +1 @@
|
|||
ssh-rsa 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
|
Loading…
Reference in a new issue